On Fri, 07 Nov 2008 21:51:47 +0100, Dean Anderson <[EMAIL PROTECTED]> wrote:

On Thu, 6 Nov 2008, Yngve N. Pettersen (Developer Opera Software ASA) This is better. But doesn't fix the underlying problem that breadth and
scope of administrative control can't be determined by opera, or by
anyone external to the administrative control.  And
downloading/maintaining/controlling this file is another problem to
manage.  Historically, this hasn't been found to be a very scalable
solution.

Please see sec. 2 and 2.1 (use of HTTPS for retrieval, and digital signatures of content).

Also, trying to have opera determine and distribute this information
about what administrative domains there are on the internet is another
serious problem. Not least of which, downloading the results of opera
project's scanning is also a security concern.

Please see Appendix A (possible methods for collecting the information)

If you mean to have a file determined by the admin domain itself, client
and server need to authenticate and verify that file---with what
certificate?  Who knows if the certificate offered is the __right__

Again, see sec 2 and appendix A. Actual information collection is outside the scope of the current version of this draft, because there are multiple methods; a separate specification will be needed for that part.

certificate?  Only the user can figure that out. So you haven't made
things any easier for the user; they STILL need to verify certificates.

Opera is already downloading root certificates from a digitally signed online repository using a secure connection, and the download is done in a fashion that the user will NOT be asked about certificates concerning that download. A dynamic download of the TLD structure information would be done in a similar manner, without user interaction.

Well, as I've mentioned earlier, cookies is the area that have spurred
my development of this specification. It is not the only area asking
for such information, as I've also mentioned earlier, for example URL
display in FF3 and IE8, and if I am not mistaken, Google Chrome. And
there are likely more.

I'm not familiar with these proposed uses. But it would seem on the
surface that they are solved by the same http/cookie change as I
suggested.

I doubt that, they are needed in areas that are not using cookies, such as presentation of URL strings.

In any case: Google, Microsoft and Mozilla are ALL, right now, deploying browsers using Mozilla's PublicSuffix database, and two of them have been doing so for more than 6 months.

One area where developers want to use such information is to help
users understand where they actually are on the Internet, for example
when being directed somehow to
"www.my-trusted-bank.com.foo.bar.and.something.else.malicious.example.net",
by highlighting "malicious.example.net", and making the rest almost
invisible.

That is a very subjective distinction. Who knows whether
malicious.example.net is actually malicious?  'Malice' is a property
that can't be determined by finite automata.  It cannot be done
automatically. However, the security and trust aspect is easily handled
by using SSL and teaching USERS how to properly verify the certificates.
There is no way around that requirement; There are only two cases:  If
the users don't verify trust properly, they can't ever be sure of the
trusted authenticity of the server. If the users do verify properly,
there is no way to fool them.

I suspect you misunderstand what the example is really about.

It is about a widely used spoofing attack against users.

An ordinary user would look at the beginning of the above hostname, "www.my-trusted-bank.com", and *ignore* the remainder of the name because they have been trained to look for that particular name, often missing the crucial part of a "/" being needed immediately afterwards. That is also what made http://[EMAIL PROTECTED]/ such a nice tool for spoof stories until browsers made it much harder to use that method.

The result is that the user will believe they are on the trusted site, and may provide the site with important credentials.

The method used by Microsoft in IE8 Beta 1 (relased in March) is to highlight the real domain of the site, making it possible for an observant user to detect the discrepancy between what they expected their online location to be, and the reality.

It is not a complete solution, but it is part of what a browser can do to better inform the user, also on non-secure sites.


without the interaction of the user.  You are merely trying to grapple
the impossible, without realizing it is impossible.

Even if something is, strictly speaking, "impossible" (like calulating the exact numerical value of Pi), a good approximation (3.14159) will most often be sufficiently accurate for ordinary use, nor does it mean that we should not try to discover and use sufficiently good approximations. (Another example is IDNAbis)

Opera is currently using one approximation for cookie domain validation, using DNS, described in the "DNSCOOKIE" draft; Mozilla and PublicSuffix are probably using a much better approximation, information that can be used in the subTLD structure protocol.

IMO, an even better approximation to what our applications need for various automatic security features, would be a list of registry-like domains provided by the TLD regisitries.

If there are better approximations the DNSOp WG and other interested parties are encouraged to come forward with them.

--
Sincerely,
Yngve N. Pettersen
 
********************************************************************
Senior Developer                     Email: [EMAIL PROTECTED]
Opera Software ASA                   http://www.opera.com/
Phone:  +47 24 16 42 60              Fax:    +47 24 16 40 01
********************************************************************
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to